309 Works
Code to generate keys
Wei Ren & Xiaohan Hao
Key is the core element of constructing Bitcoin trust network. The key usually consists of private key and public key. The private key is used to generate signatures and the public key is used to generate addresses. Bitcoin keys are generated by the elliptic curve algorithm SECP256k1. This data set contains the core code to generate the key.
trainingdataIEEETII_18_1904
Youngjin Kim
A part of training data for the research (TII-18-1904, under review)
Cybersecurity - Zapaat - India
Syamantak Saha
This Data provides a report on the number of Cyberattacks received by Zapaat Search Engine - the server being hosted in India. A list of offending IP addresses is also provided.
The history data of an IRB 1200 grinding robot
Xianhe Wen
This data is the history data of an IRB 1200 grinding robot. It can be used to do the predictive analysis of the robot.
On the Energy Footprint of Mobile Testing Frameworks
Luis Cruz & Rui Abreu
High energy consumption is a challenging issue that an ever increasing number of mobile applications face today.However, energy consumption is being tested in an ad hoc way, despite being an important non-functional requirement of an application.Such limitation becomes particularly disconcerting during software testing: on the one hand, developers do not really know how to measure energy; on the other hand, there is no knowledge as to what is the energy overhead imposed by the testing...
Process Models
Michael Zimoch
Used process models in the study.
Pulse Spannungsmeßgerät und Die elektrodermale Aktivität / galvanische Hautreaktion (fur wissenschaftlicher Streit, eine gelehrte Fehde)
E.D. Adamovich
Pulse millivoltmeter is designed to measure the amplitude of a sequence of rectangular video pulses of positive and negative polarities, amplitudes of radio rectangular and sinusoidal voltages. It can be used for linear transformation of the amplitude of the periodic pulses of DC voltage.
Teraohmmeter-assisted measurements of plant leaf resistance. 3. Oscillations of plant leaf resistance / impedance.
E.D. Adamovich & O.V. Gradov
Oscillations of plant leaf resistance / impedance (10x time-lapse registration).
Teraohmmeter-assisted measurements of plant leaf resistance. 4. Accelerated photoinduced kinetics of electric impedance shifting under UV irradiation.
E.D. Adamovich & O.V. Gradov
Accelerated photoinduced kinetics of electric impedance shifting under UV irradiation.
Meshes of Various Design and Deformation
Michael Joon Seng Goh, Ji Jinn Foo & Yeong Shiong Chiew
Stereolithographic files of three different mesh designs; Square, Triangular and Hexagonal (top to bottom rows in image). Each mesh design is provided in three different deformations; Flate/no deformation, Mode 1 deformation and Mode 5 deformation (left to right columns in image). Mode 1 and Mode 5 deformation was obtained with the four outer surfaces of the frame fixed and the out-of-plane deformation scaled down.
Modulation of Neural Activity during Guided Viewing of Visual Art
Jesús Tamez-Duque , Mayra De-Alba , Guillermo Herrera-Arcos, Fernanda Zapata, José L Contreras-Vidal & Rogelio Soto
Mobile Brain-Body Imaging (MoBI) technology was deployed at the Museo de Arte Contemporáneo (MARCO) in Monterrey, México, in an effort to collect Electroencefalographic (EEG) data from large numbers (N = ~1200) of participants and allow the study of the brain’s response to artistic stimuli, as part of the studies developed by University of Houston (TX, USA) and Tecnológico de Monterrey (MTY, México).In this dataset, we include EEG recordings corresponding to brain activity of 25 subjects...
Application in Investment Portfolio by Neural Network
Xin Yu
we use the proposed neural network to solve an application in an investment portfolio optimization problem.
A distributed Front-end Edge node assessment by using a learning-to-rank method
Amin Shahraki
This dataset is related to the paper "A distributed Front-end Edge node assessment by using a learning-to-rank method"
Dataset for fuzzzing data generation based on deep advisial learning
Zhihui Li
This dataset was collected from an industrial control system running the Modbus protocol.It is used to train a deep adversarial learning model.This model is used to generate fuzzing data in the same format as the real one. The data is a sequence of hexadecimal numbers. The followed generated data is produced by the already trained model.